mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
549 lines
No EOL
18 KiB
JSON
549 lines
No EOL
18 KiB
JSON
[
|
|
{
|
|
"id": 77386317,
|
|
"name": "exploit-CVE-2016-10033",
|
|
"full_name": "opsxcq\/exploit-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "opsxcq",
|
|
"id": 16995025,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
|
|
"html_url": "https:\/\/github.com\/opsxcq",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/opsxcq\/exploit-CVE-2016-10033",
|
|
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
|
"fork": false,
|
|
"created_at": "2016-12-26T13:39:03Z",
|
|
"updated_at": "2024-11-20T07:24:58Z",
|
|
"pushed_at": "2023-02-27T06:48:09Z",
|
|
"stargazers_count": 404,
|
|
"watchers_count": 404,
|
|
"has_discussions": false,
|
|
"forks_count": 147,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2016-10033",
|
|
"docker",
|
|
"exploit",
|
|
"flaws",
|
|
"php",
|
|
"php-mail",
|
|
"phpmail",
|
|
"vulnerable-container"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 147,
|
|
"watchers": 404,
|
|
"score": 0,
|
|
"subscribers_count": 26
|
|
},
|
|
{
|
|
"id": 77596573,
|
|
"name": "safeshell",
|
|
"full_name": "Zenexer\/safeshell",
|
|
"owner": {
|
|
"login": "Zenexer",
|
|
"id": 504130,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/504130?v=4",
|
|
"html_url": "https:\/\/github.com\/Zenexer",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Zenexer\/safeshell",
|
|
"description": "Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045.",
|
|
"fork": false,
|
|
"created_at": "2016-12-29T08:29:20Z",
|
|
"updated_at": "2020-03-26T18:08:07Z",
|
|
"pushed_at": "2016-12-29T08:29:21Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 8,
|
|
"score": 0,
|
|
"subscribers_count": 6
|
|
},
|
|
{
|
|
"id": 90816233,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "GeneralTesler\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "GeneralTesler",
|
|
"id": 11621390,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11621390?v=4",
|
|
"html_url": "https:\/\/github.com\/GeneralTesler",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/GeneralTesler\/CVE-2016-10033",
|
|
"description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html",
|
|
"fork": false,
|
|
"created_at": "2017-05-10T03:18:46Z",
|
|
"updated_at": "2024-08-12T19:29:44Z",
|
|
"pushed_at": "2017-05-10T03:32:56Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 90859397,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "chipironcin\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "chipironcin",
|
|
"id": 3980637,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3980637?v=4",
|
|
"html_url": "https:\/\/github.com\/chipironcin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/chipironcin\/CVE-2016-10033",
|
|
"description": "Code and vulnerable WordPress container for exploiting CVE-2016-10033",
|
|
"fork": false,
|
|
"created_at": "2017-05-10T12:01:07Z",
|
|
"updated_at": "2024-08-12T19:29:44Z",
|
|
"pushed_at": "2017-06-12T08:31:52Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 91805498,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "Bajunan\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "Bajunan",
|
|
"id": 21322263,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21322263?v=4",
|
|
"html_url": "https:\/\/github.com\/Bajunan",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Bajunan\/CVE-2016-10033",
|
|
"description": "WordPress 4.6 - Remote Code Execution (RCE) PoC Exploit",
|
|
"fork": false,
|
|
"created_at": "2017-05-19T12:52:21Z",
|
|
"updated_at": "2017-05-19T12:56:58Z",
|
|
"pushed_at": "2017-05-19T12:57:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 95639951,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "qwertyuiop12138\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "qwertyuiop12138",
|
|
"id": 29748162,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29748162?v=4",
|
|
"html_url": "https:\/\/github.com\/qwertyuiop12138",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/qwertyuiop12138\/CVE-2016-10033",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-06-28T07:09:54Z",
|
|
"updated_at": "2017-06-28T07:09:54Z",
|
|
"pushed_at": "2017-06-28T07:09:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 98003871,
|
|
"name": "WP-CVE-2016-10033",
|
|
"full_name": "liusec\/WP-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "liusec",
|
|
"id": 13982415,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
|
|
"html_url": "https:\/\/github.com\/liusec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/liusec\/WP-CVE-2016-10033",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-07-22T03:20:41Z",
|
|
"updated_at": "2017-07-22T03:22:49Z",
|
|
"pushed_at": "2017-07-22T03:22:48Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 111325445,
|
|
"name": "cve-2016-10033-45",
|
|
"full_name": "pedro823\/cve-2016-10033-45",
|
|
"owner": {
|
|
"login": "pedro823",
|
|
"id": 7110169,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7110169?v=4",
|
|
"html_url": "https:\/\/github.com\/pedro823",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pedro823\/cve-2016-10033-45",
|
|
"description": "Exploits CVE-2016-10033 and CVE-2016-10045",
|
|
"fork": false,
|
|
"created_at": "2017-11-19T19:31:45Z",
|
|
"updated_at": "2018-09-29T06:11:33Z",
|
|
"pushed_at": "2017-11-19T19:32:13Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 120427992,
|
|
"name": "opsxcq-cve-2016-10033",
|
|
"full_name": "awidardi\/opsxcq-cve-2016-10033",
|
|
"owner": {
|
|
"login": "awidardi",
|
|
"id": 13718319,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13718319?v=4",
|
|
"html_url": "https:\/\/github.com\/awidardi",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/awidardi\/opsxcq-cve-2016-10033",
|
|
"description": "To solve CTFS.me problem",
|
|
"fork": false,
|
|
"created_at": "2018-02-06T08:59:14Z",
|
|
"updated_at": "2018-12-06T10:45:57Z",
|
|
"pushed_at": "2018-02-06T09:15:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 120918253,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "0x00-0x00\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "0x00-0x00",
|
|
"id": 23364530,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
|
"html_url": "https:\/\/github.com\/0x00-0x00",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2016-10033",
|
|
"description": "PHPMailer < 5.2.18 Remote Code Execution Exploit ",
|
|
"fork": false,
|
|
"created_at": "2018-02-09T14:53:51Z",
|
|
"updated_at": "2020-12-29T03:25:52Z",
|
|
"pushed_at": "2018-02-09T14:59:02Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"2016-10033",
|
|
"cve",
|
|
"exploit",
|
|
"php",
|
|
"phpmailer"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 166266258,
|
|
"name": "cve-2016-10033",
|
|
"full_name": "cved-sources\/cve-2016-10033",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2016-10033",
|
|
"description": "cve-2016-10033",
|
|
"fork": false,
|
|
"created_at": "2019-01-17T17:20:24Z",
|
|
"updated_at": "2021-04-15T21:13:09Z",
|
|
"pushed_at": "2021-04-15T21:13:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 401719121,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "j4k0m\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "j4k0m",
|
|
"id": 48088579,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
|
"html_url": "https:\/\/github.com\/j4k0m",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2016-10033",
|
|
"description": "Remote Code Execution vulnerability in PHPMailer.",
|
|
"fork": false,
|
|
"created_at": "2021-08-31T13:46:28Z",
|
|
"updated_at": "2021-09-07T21:09:02Z",
|
|
"pushed_at": "2021-08-31T14:06:05Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 521560709,
|
|
"name": "exploit-CVE-2016-10033",
|
|
"full_name": "zeeshanbhattined\/exploit-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "zeeshanbhattined",
|
|
"id": 110241653,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110241653?v=4",
|
|
"html_url": "https:\/\/github.com\/zeeshanbhattined",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zeeshanbhattined\/exploit-CVE-2016-10033",
|
|
"description": "PHPMailer < 5.2.18 Remote Code Execution",
|
|
"fork": false,
|
|
"created_at": "2022-08-05T08:24:14Z",
|
|
"updated_at": "2022-08-05T08:25:38Z",
|
|
"pushed_at": "2022-08-05T08:25:28Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 567538645,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "CAOlvchonger\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "CAOlvchonger",
|
|
"id": 54507304,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54507304?v=4",
|
|
"html_url": "https:\/\/github.com\/CAOlvchonger",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CAOlvchonger\/CVE-2016-10033",
|
|
"description": "wordpress docker",
|
|
"fork": false,
|
|
"created_at": "2022-11-18T02:07:39Z",
|
|
"updated_at": "2022-11-18T02:07:39Z",
|
|
"pushed_at": "2022-11-18T02:07:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 576075642,
|
|
"name": "CTF_CVE-2016-10033",
|
|
"full_name": "eb613819\/CTF_CVE-2016-10033",
|
|
"owner": {
|
|
"login": "eb613819",
|
|
"id": 70245295,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70245295?v=4",
|
|
"html_url": "https:\/\/github.com\/eb613819",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/eb613819\/CTF_CVE-2016-10033",
|
|
"description": "CTF based around CVE-2016-10033",
|
|
"fork": false,
|
|
"created_at": "2022-12-09T00:28:24Z",
|
|
"updated_at": "2022-12-09T01:25:05Z",
|
|
"pushed_at": "2022-12-09T01:25:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 801707781,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "ElnurBDa\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "ElnurBDa",
|
|
"id": 121972600,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121972600?v=4",
|
|
"html_url": "https:\/\/github.com\/ElnurBDa",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ElnurBDa\/CVE-2016-10033",
|
|
"description": "CVE-2016-10033 Wordpress 4.6 Exploit",
|
|
"fork": false,
|
|
"created_at": "2024-05-16T18:56:39Z",
|
|
"updated_at": "2024-05-16T18:56:50Z",
|
|
"pushed_at": "2024-05-16T18:56:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 804180682,
|
|
"name": "POC-CVE-2016-10033",
|
|
"full_name": "Astrowmist\/POC-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "Astrowmist",
|
|
"id": 137168130,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137168130?v=4",
|
|
"html_url": "https:\/\/github.com\/Astrowmist",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Astrowmist\/POC-CVE-2016-10033",
|
|
"description": "Proof Of Concept for the CVE-2016-10033 (PHPMailer)",
|
|
"fork": false,
|
|
"created_at": "2024-05-22T05:33:58Z",
|
|
"updated_at": "2024-06-06T11:56:40Z",
|
|
"pushed_at": "2024-06-06T11:56:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2016-10033",
|
|
"exploit",
|
|
"php",
|
|
"poc"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |